Cryptographic Services

Did you ever really consider that security is like a cake? Well, it is: It is best in layers. Just like your favorite cake, cryptography can be layered to help build a true defense in depth. Many types of cryptographic solutions can be applied, from the application layer all the way down to the data frame.

Secure Email

Standard email uses the Simple Mail Transfer Protocol (SMTP), port 25, to accept messages from clients; and Post Office Protocol (POP3) version 3 and port 110 to retrieve email from server-based inboxes. Sending an email is much like sending a postcard through the postal service: Anyone along the way can easily read the note you wrote to your mom while visiting Niagara Falls. Fortunately, several digital services enable you to seal the mail in an envelope.

Pretty Good Privacy (PGP)

PGP was developed in 1991 by Phil Zimmermann to provide privacy and authentication. Over time, it evolved into an open standard known as OpenPGP. PGP is unlike PKI, in that there is no CA. PGP builds a web of trust, which is developed as users sign and issue their own keys. Users must determine what level of trust they are willing to place in other parties. The goal of PGP was for it to become the "everyman's encryption." No longer would encryption be available only to companies and corporations. Popular programs such as Hushmail and Veridis are based on PGP.

Other Email Security Applications

Secure email solutions are important because email is one of the most widely used Internet applications. Several other applications are available to help secure email:

Secure TCP/IP Protocols

Securing email is just one of the CISSP's goals. Other cryptographic solutions are available to increase security at all the layers of the TCP/IP stack. Because security wasn't one of the driving forces when the TCP/IP protocols were developed, these solutions can go a long way toward protecting the security of the organization.

Application-Layer Cryptographic Solutions

The following application-layer protocols can be used to add confidentiality, integrity, or nonrepudiation:

Transport- and Internet-Layer Cryptographic Solutions

The transport and Internet layers of the TCP/IP stack can also be used to add cryptographic solutions to data communications. Some common examples follow:

IPSec

Internet Protocol Security (IPSec) is an end-to-end security technology that allows two devices to communicate securely. IPSec was developed to address the shortcomings of IPv4. Although it is an add-on for IPv4, it is built into IPv6. IPSec can be used to encrypt just the data or the data and the header.

Lower-Layer Cryptographic Solutions

Physical-layer cryptographic solutions include these:

Moving the Data

As the various protocols have shown, there are many ways to encrypt and secure data. One final decision that must be considered is how information is to be moved between clients. You could decide to choose a method that simply encrypts the data payload (end-to-end encryption), or one that encrypts everything (link state encryption), including the data and the header:

Категории